Security Requirements |
Confidentiality Requirement: |
|
Integrity Requirement: |
|
Availability Requirement: |
|
Modified Base Metrics |
Modified Access Vector: |
|
Modified Attack Complexity: |
|
Modified Privileges Required: |
|
Modified User Interaction: |
|
Modified Scope: |
|
Modified Confidentiality Impact: |
|
Modified Integrity Impact: |
|
Modified Availability Impact: |
|